Resources | Subject Notes | Computer Science
Data security is crucial in modern computing to protect information from unauthorized access, use, disclosure, disruption, modification, or destruction. This section describes various security methods designed to safeguard data.
Authentication is the process of verifying the identity of a user, device, or system. It ensures that only authorized entities can access resources.
Access control mechanisms restrict who can access specific data or resources and what actions they can perform.
Encryption transforms data into an unreadable format (ciphertext) using an algorithm and a key. Only those with the correct key can decrypt the data back to its original form (plaintext).
Type of Encryption | Description | Use Case |
---|---|---|
Symmetric Encryption | Uses the same key for encryption and decryption. | Encrypting large amounts of data, such as file storage. Examples: AES, DES. |
Asymmetric Encryption | Uses a pair of keys: a public key for encryption and a private key for decryption. | Secure key exchange, digital signatures. Examples: RSA, ECC. |
Hashing | Creates a fixed-size string (hash) from data. One-way process; cannot be reversed. | Password storage, data integrity checks. Examples: SHA-256, MD5 (less secure). |
Firewalls act as a barrier between a network and external networks, controlling incoming and outgoing network traffic based on predefined rules.
IDS monitors network traffic for malicious activity. IPS takes proactive steps to block or prevent detected intrusions.
DLP systems monitor data in use, in motion, and at rest to prevent sensitive information from leaving the organization's control.
Writing code with security in mind helps prevent vulnerabilities from being introduced into software.
Regularly backing up data and having a recovery plan ensures that data can be restored in the event of data loss or corruption.